General
-
Target
1902eac6ce24ccf7ef3dc696cbed9ce0edf6c96366e2f6b5dbdba5033c5d4a3b
-
Size
56KB
-
Sample
241120-w945lawjep
-
MD5
0479c2b6acbad3d0e25e55305b9bf171
-
SHA1
f1c23dd6690644afe8540db037c4bcb4eb9d8160
-
SHA256
1902eac6ce24ccf7ef3dc696cbed9ce0edf6c96366e2f6b5dbdba5033c5d4a3b
-
SHA512
a4d89599aaf6a80345f2fffa12eb043f58dce5d74a7bc57bfe1c7bcdbc76a1f44db701339dca30922338fa3156d9165dc57c845f2860f1988ef984051e6ebaa8
-
SSDEEP
1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4XsvC:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgW
Behavioral task
behavioral1
Sample
1902eac6ce24ccf7ef3dc696cbed9ce0edf6c96366e2f6b5dbdba5033c5d4a3b.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1902eac6ce24ccf7ef3dc696cbed9ce0edf6c96366e2f6b5dbdba5033c5d4a3b.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://dharian.org/_sharedtemplates/D3QgytUZsO7korYQrG/
http://digitalripple.com/scripts/4ovLPfq/
Targets
-
-
Target
1902eac6ce24ccf7ef3dc696cbed9ce0edf6c96366e2f6b5dbdba5033c5d4a3b
-
Size
56KB
-
MD5
0479c2b6acbad3d0e25e55305b9bf171
-
SHA1
f1c23dd6690644afe8540db037c4bcb4eb9d8160
-
SHA256
1902eac6ce24ccf7ef3dc696cbed9ce0edf6c96366e2f6b5dbdba5033c5d4a3b
-
SHA512
a4d89599aaf6a80345f2fffa12eb043f58dce5d74a7bc57bfe1c7bcdbc76a1f44db701339dca30922338fa3156d9165dc57c845f2860f1988ef984051e6ebaa8
-
SSDEEP
1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4XsvC:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-